{"id":48369,"date":"2014-12-09T05:48:38","date_gmt":"2014-12-09T10:48:38","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-accused-of-spying-on-cellphone-carriers-to-find-security-exploits\/"},"modified":"2014-12-09T05:48:38","modified_gmt":"2014-12-09T10:48:38","slug":"nsa-accused-of-spying-on-cellphone-carriers-to-find-security-exploits","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/nsa-accused-of-spying-on-cellphone-carriers-to-find-security-exploits\/","title":{"rendered":"NSA Accused Of Spying On Cellphone Carriers To Find Security Exploits"},"content":{"rendered":"<p><p>    December 8, 2014  <\/p>\n<p>      Chuck Bednar for redOrbit.com  Your Universe      Online    <\/p>\n<p>      US National Security Agency (NSA) employees spent years monitoring      domestic and international companies to find security      vulnerabilities that could be exploited for surveillance      purposes, according to new reports originating from documents      obtained by former NSA contractor Edward Snowden.    <\/p>\n<p>      Ryan Gallagher of The Intercept, who first      broke the story, said that the program was codenamed      Auroragold and also detailed how the agency planned      to secretly introduce new flaws into communication systems      that it could tap into  but which experts said would also      have made the general public more susceptible to hackers in      the process.    <\/p>\n<p>      The covert operation has monitored the content of messages      sent and received by more than 1,200 email accounts      associated with major cellphone network operators,      intercepting confidential company planning papers that help      the NSA hack into phone networks, Gallagher said.    <\/p>\n<p>      One high-profile surveillance target is the GSM Association      (GSMA), an influential UK-headquartered trade group that      works closely with large US-based firms including Microsoft,      Facebook, AT&T, and Cisco, and is currently being funded      by the U.S. government to develop privacy-enhancing      technologies, he added.    <\/p>\n<p>      CNET technology columnist      Don Reisinger said the NSA targeted IR.21 documents, which      highlight new technologies and encryption methods used by mobile carriers, and      Chris Johnston of The Guardian said that the      documents reveal that the agency targeted meetings held by      the trade association.    <\/p>\n<p>      Cryptographer and cellphone security expert Karsten Nohl told      Gallagher that information contained in the      Auroragold documents provide hints that the volume      and broad scope of data collected as part of the operation      suggests the intent was to make sure that the overwhelming      majority of mobile networks worldwide were NSA accessible.    <\/p>\n<p>      Collecting an inventory [like this] on world networks has      big ramifications, Nohl said, because it allows the agency      to monitor and work around improvements in encryption      technology cell providers utilize to protect calls and text      messages from eavesdropping.    <\/p>\n<p>      He added that evidence suggesting the NSA was deliberately      attempting to weaken mobile communication infrastructure was      especially alarming, since those vulnerabilities could be      exploited by anyone, not just the NSA. The files also reveal      that the NSA basically had unfettered access to the      infrastructure of roughly 700 global wireless carriers as of      May 2012, Engadgets Chris Velazco added.    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Visit link:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.redorbit.com\/news\/technology\/1113294383\/nsa-accused-of-spying-on-cellphone-carriers-to-find-security-exploits-120814\" title=\"NSA Accused Of Spying On Cellphone Carriers To Find Security Exploits\">NSA Accused Of Spying On Cellphone Carriers To Find Security Exploits<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> December 8, 2014 Chuck Bednar for redOrbit.com Your Universe Online US National Security Agency (NSA) employees spent years monitoring domestic and international companies to find security vulnerabilities that could be exploited for surveillance purposes, according to new reports originating from documents obtained by former NSA contractor Edward Snowden. Ryan Gallagher of The Intercept, who first broke the story, said that the program was codenamed Auroragold and also detailed how the agency planned to secretly introduce new flaws into communication systems that it could tap into but which experts said would also have made the general public more susceptible to hackers in the process. The covert operation has monitored the content of messages sent and received by more than 1,200 email accounts associated with major cellphone network operators, intercepting confidential company planning papers that help the NSA hack into phone networks, Gallagher said <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/nsa-accused-of-spying-on-cellphone-carriers-to-find-security-exploits\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-48369","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/48369"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=48369"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/48369\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=48369"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=48369"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=48369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}